1 / 14

Forensic Science Questioned Documents: Part 3

Forensic Science Questioned Documents: Part 3. Forging money is known as counterfeiting. This is one of the oldest crimes. During the Civil War, when all banks issued their own currency, approximately one-third of money was counterfeit. This was a threat to the U.S. economy.

skyler
Download Presentation

Forensic Science Questioned Documents: Part 3

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Forensic ScienceQuestioned Documents: Part 3

  2. Forging money is known as counterfeiting. • This is one of the oldest crimes. • During the Civil War, when all banks issued their own currency, approximately one-third of money was counterfeit. This was a threat to the U.S. economy. • So in 1863, the United States adopted a national currency. Counterfeiting

  3. The adoption of the national currency really did not curtail the amount of counterfeiting. • In 1865, the Secret Service was created to investigate and stop counterfeiting. • Although counterfeiting is not as pervasive as it once was, it is still a common crime. The latest technology has made it much easier to copy and counterfeit money. In 1996, the U.S. government began to add new features to money. Counterfeiting (cont.)

  4. Some of these features include: • A watermark • Color shifting ink • Off-center portrait • Randomly disbursed red and blue fibers in the paper • Microprinting Counterfeiting (cont.)

  5. Other Responsibilities The Document Examination Unit not only examines questioned documents, but works with other areas that link to forgery and fraud. One such area is Cryptology or Cryptography. Cryptography comes from the Greek words kryptos (secret) and graphos (writing).  Codes and ciphers are examples of cryptography.

  6. Codes Codes use symbols or groups of letters to represent words or phrases. Codes may be as easy as the non-secret SOS distress code or so secretive that both sender and receiver need a Code Book.

  7. Morse Code In 1838, Samuel Morse invented Morse Code. Morse Code is not really a code, but an electro-magnetic telegraph system that uses a system of dots and dashes. However, codes were sent in Morse Code format and then decoded. Morse Code was a very important message system during World War I.

  8. Listen to a Morse Code Message. What does it say? Create your own Morse Code Message: http://morsecode.scphillips.com/jtranslator.html Morse Code

  9. https://www.youtube.com/watch?v=Hb44bGY2KdU The Enigma During World War II, the Germans used the Enigma machine. This machine could put a message into code in over 150 MILLION MILLIONMILLION different ways. The Germans believed that the Enigma was invincible, but eventually the code was broken by the Allies.

  10. Colossus - “The Bomb” • Colossus was the machine that helped to break the Enigma code. • Colossus was the world’s first programmable computer.

  11. Ciphers In a cipher one letter is replaced with another by either a simple or a complex scheme

  12. Ciphers Knowing English Letter Frequency helps to break a cipher. E is the most commonly used letter.

  13. Invisible Ink • Codes or secret messages may be written with invisible ink. • The author uses ordinary paper, but the writing will disappear when the ink dries.

  14. Retrieving the Message Seeing the invisible message depends on the type of ink used. UV light, heat, chemical developers or a combination of these will reveal the hidden message.

More Related